Skip to content

Commit

Permalink
Update docs/docs/adrs/adr-005-cryptographic-equivocation-verification.md
Browse files Browse the repository at this point in the history
Co-authored-by: Marius Poke <[email protected]>
  • Loading branch information
sainoe and mpoke committed Aug 3, 2023
1 parent 03f47ad commit 3039ad6
Showing 1 changed file with 1 addition and 1 deletion.
Original file line number Diff line number Diff line change
Expand Up @@ -35,7 +35,7 @@ A light client attack occurs when a Byzantine validator sends invalid headers to
As the light client doesn't execute transactions, it can be deceived into trusting corrupted application state transitions.
For instance, if a light client receives header `A` from the primary and header `B` from a witness for the same block height `H`,
and both headers are successfully verified, it indicates a light client attack.
Note that it this case, either the primary and/or witness nodes are malicious.
Note that in this case, either the primary or the witness or both are malicious.

To orchestrate a light client attack, Byzantine actors create a header with incorrect state transitions that must be signed by ⅓+ of the voting power.
The types of light client attacks are defined by analyzing the differences between the conflicting headers.
Expand Down

0 comments on commit 3039ad6

Please sign in to comment.